Senators back Obama's call for cybersecurity reformThe Hill (blog)"As Chairman of the Senate Commerce Committee, I fully support efforts to protect our national security by passing cyber security legislation. I have been working for years to address our country's vulnerability to cyber-attacks and believe now is the ...

Why cyber security represents a new cold warSC Magazine UKThe nuclear standoff of the 60s may be behind us, but a new cold war, or rather code war, has started to grip the globe. Cyber espionage is real and present danger for every form of organisation. Only recently, Foreign Secretary William Hague said ...SC Magazine UK

Four Recognized Experts Selected to Keynote SEPG North America 2012MarketWatch (press release)... acting assistant secretary of the Office of Cybersecurity and Communications (CS&C), where she plays a leading role in developing the strategic direction for all of CS&C and its components, consisting of the National Cyber Security Division (NCSD), ...

DHS denies rail attack despite detailed TSA memoExaminer.com"Railroads closely monitor cyber security as a fully integrated part of both the industry's overall security plan, as well as individual company plans. Continuous coordination on cyber securityoccurs across the industry and with the federal government ...

"Great Decisions," advice for cyber securityKYTXBy Amanda Roberson - email EAST TEXAS (KYTX) -- More than 80 East Texans were all ears as two UT Tyler computer science professors explained the basics we all need to remember -- about what happens in the cyber world and why many computer users are at ...

Center for Internet Security Recognizes Data Privacy Day on January 28DigitalJournal.com (press release)In support of Data Privacy Day, the Center for Internet Security (CIS), a national not-for-profit focused on enhancing the cyber security readiness and response of public and private sector entities, today issued tips to help users protect themselves ...

How to protect your company's dataBizjournals.comIn fact, 85 percent of business owners believe their company is safe from hackers, viruses, malware or a cyber-security breach, according to a September 2011 survey of over 1000 US small businesses sponsored by Symantec Corp. and the National Cyber ...

Delaware Valley grad contributes to Obama speechPocono RecordFinan is the director for cybersecurity legislation on the national security staff at the White House. He works on a team under John Brennan, the president's chief counterterrorism adviser, and Howard Schmidt, US cybersecurity coordinator.

Davos 2012: Alarming growth in cyber-attacksTelegraph.co.ukPwC says cyber security was often seen as a technology issue and not dealt with at the appropriate level in the business. Photo: ALAMY By Kamal Ahmed, Sunday Telegraph Business Editor, Davos Ian Powell, UK chairman and senior partner of PwC,...Telegraph.co.uk

Raytheon profit rises 18% on lower costsMarketWatchRaytheon and other defense companies have been diversifying into growing areas such as cybersecurity and seeking international growth in response to lean US defense spending. Raytheon in November won approval from the US Congress and the State ...

Jobseekers Networking SeminarSouthern Maryland OnlineTime will be provided to network with the speaker and other jobseekers. 1/27/2012 Mike Covert of Assevero, Cyber Security Professionals. “Current Cyber Security Opportunities” Assevero wants you to know how they hope to find and develop candidates.

House Homeland Security lawmakers request sole oversight of DHSNextgovOn the subject of cybersecurity alone, Congress since April 2011 has brought in DHS officials for roughly 10 hearings, including sessions at the House committees on Homeland Security, Energy and Commerce, Financial Services, Judiciary and Oversight and ...

ANSI 17024 Accreditation performed for first time outside USA.ThomasNet Industrial News Room (press release)EC-Council is committed to cybersecurity and currently seeking ANSI accreditation of its Certified Ethical Hacker (CEH v8) certification program. This recognition is important because many US federal agencies and private organizations use this ...

PaRaBaL Requested to Speak at ISSA's International ConferencePR Web (press release)PaRaBaL Inc. a leading cyber security training and assessment company specializing in Apple iOS mobile device security (iPad and iPhone), was requested to speak on mobile computing security in the workforce at ISSA's International Conference located in ...

O2 phone numbers leak just the start?T3In response to the O2 phone numbers leak a number of privacy and cyber security experts have come together to warn customers that this is not the last time their phones will be under threat. Speaking at a forum which was held yesterday Stuart Coulsen, ...

President Obama Thinks U.S. Cyber Security Should Be ...By jacobechoed President Obama's call in the State of the Union for Congress to pass comprehensivecybersecurity legislation.. Read more at The Hill. Tagged with: cyber defense • cyber security • national security • policy. If you enjoyed this article, ...SecureWorld Post

Dealing with 2012's security hot potato « BT Viewpoint. Business ...By DanielBoothIt's down to Chief Security Officers (CSO) to come up with a solution; to stop the constant game of catch-up and adding cyber security controls only after a problem has highlighted the lack of cyber security protocols. Guest blogger and Head of ...BT Viewpoint. Business insight,...

Estonia and Indonesia Consider Fight against Piracy and Cyber ...In a meeting in Jakarta with Indonesian Minister of Defence Purnomo Yusgiantoro, Foreign Minister Urmas Paet talked about cyber security and cyber protection as well as opportunities for Estonian companies to participate in Indonesia's ...Estonian Embassy in Russia :: News

DHS denies rail attack despite detailed TSA memo - Grendel Report"Railroads closely monitor cyber security as a fully integrated part of both the ... Continuous coordination on cyber security occurs across the industry and with the ... November received a great deal of media attention when a cyber security ...Grendel Report

Chemical Facility Security News: Reader Email – Expected Alerts ...By PJCoyleIf an energetic cybersecurity manager knew which systems came with default passwords and knew what they were, it would be a relatively easy (okay so that is a slight exaggeration, and our receptionist is just slightly pregnant) to go back and ...Chemical Facility Security News